All posts by Editor-in-Chief 903-662-8832

Which login email? Which password?

In today’s online world, nearly every company, every website, every electronic service, wants to assign you an account consisting of a login account name and a password. The concept seems simple enough, for the first account, but then you sign up for another service, and they assign yet another login account name, and associate yet another password. Before long, you have dozens of account names, and dozens of passwords. How can they be kept straight?

Software makers, such as Microsoft, Firefox, and Mozilla offer solutions such as password key keepers. The idea is if you forget one of your passwords, you can go to your password keeper, enter one master password, and see all your accounts and passwords. The very bad side to this system is, if someone gets your master password, they now have access to ALL your accounts at once. All or nothing is a bad system. The custom-made solution of putting all your information into a password-protected spreadsheet or document is essentially the same bad solution. One password grants access to your entire life’s electronic accounts. Another bad “solution” many people arrive at is to use the same password on all their online accounts. Of course this is worse than the master password file — the file isn’t even needed to get in!

Some of the major online account providers, such as Google, Amazon, and Microsoft, now provide multi-platform authentication. Multi-platform authentication means, for instance, the ability to go to a site such as and instead of creating a new account name and password, it offers that my Google information may be used to login. As long as I remember my Google account information, I can access not only Google, but Yelp as well. This reduces the number accounts I must track, but it also creates a greater dependency on Google. If I lose my Google account information, I also lose my access to Yelp. This can also get very confusing if competing providers allow each-other’s login information to authenticate into their system. For example, logging into Google with a Microsoft account email address and password.

B. A. Computer Services uses many systems itself and would like to share with you what we believe is a best practice regarding maintaining multiple account passwords. Our policy addresses the fact human mental capacity is not flawless, and yet there is a real security need. We cannot disclose exactly the methods we use due to our own security needs, but we can offer similar tactics without giving away our security measures.

To begin with, if you already have quite a few accounts, you should privately list them with pen and ink to get them straightened out. If you have lost access to some accounts or need password resets, the online provider’s “Forgot Password” option may be needed to regain access. B. A. Computer Services can assist you with the process confidentially in our office. We will help you begin a table that will look something like this, and for this example, let’s assume your name is John Doe:

Google.commyemailaddress @anywhere.comGo#JDoe#2022anotheremailaddress
Live.comLi#JDoe#2022 Select “use Google to login” see Google see Google myemailaddress @anywhere.comBa#JDoe#2022 my bank account number, DOB, and SSN
Example Password System

In the above example, even if 1000 random people used this example instance, each and every account password would be different for every online account for each person. The random hacker might gain access to one of the weaker sites, but they would have to start all over again to hack the next site. The strength of this system is: 1) All your passwords can easily be remembered and yet are not exactly the same for each online site; 2) the passwords are using uppercase and lowercase, a symbol, and a number which will generally pass every online site’s minimum password strength criteria. Unfortunately, this suggested system also has some serious weaknesses: 1) it is based on your name, very easily guessable; 2) it uses a rather weak number, the current year, also guessable; and 3) because it is systematic, if you ever give someone one of your passwords, they could guess your system and produce all the other online passwords.

These password-system weaknesses can be addressed as follows:

  • Make every password at least two (2) segments separated by at least one symbol character. (XXX#xxxx#xxxx#xxxxx or YYYYYY-YY-YYYYYYY or zzzzzzzzzz%^zzzzz%^zz) The length of the segments, the number of segments, and the special characters used to separate segments is entirely arbitrary, except total password length must be greater than 8 characters.
  • NEVER give one of your systematic passwords out to anyone else. (Or even if you do give them one, never hint that you have a system about it.) If you must allow someone access to your account (e.g. computer support people, or family member), CHANGE THE PASSWORD to something else simple like abc-123-456 and give that to them until they no longer need access. Change it back when they are done.
  • Do not use personal information in any part of the segment. Especially avoid dates of birth, ages, social security numbers, license numbers, personal names, children’s names, names of pets, street addresses, or anything else that could be guessed by a friend or neighbor who may observe your activities over time day by day. Do use unique phrases that have unique meaning to you alone. Do use unique non-sequential numbers that you can easily remember but not a publicly accessible number like license plate number. For example, you might remember you bought your first car on Feb 28, 1996, so using 960228 would be a perfectly legitimate choice. Unless your neighbor was there with you at the time, it unlikely they will guess this number, in this particular format.
  • Finally, in order to make each password unique and yet memorable, one of the segments must be tied to the website. Thus in the table above we used the overly simplified Go for, Li for, and Ba for This system can get tricky if the name of a website changes. For example, Angie’s List recently rebranded from to Nonetheless, major websites generally do not change over time. If one does, be sure to go back and update your related passwords for that site. You can use any combination of the website name, respell it, or slice it into parts and create two or more segments. For example, you might take the very common and place it in a password that would fit one of these schemes: xxxx-elgooG-xxxxx-xxxxx or gle-xxxxx-Go-xxxxx. Your account password under the same scheme would be similarly: xxx-tfosorciM-xxxxx-xxxxx or oft-xxxxx-Mi-xxxxx.

Let’s put it all together and make a new password table based on the examples used here. Again, these are arbitrary examples. Please be innovative and use your creativity for how you come up with your numbers, your special characters, and your site combination segments. The arrangement of the segments chosen below were entirely randomized.

Segment 1: A memorable number: 960228

Segment 2: The consonants in all caps in the name of the site, except lowercase the .com consonants

Segment 3: Special character separator: () (as many characters as you want can be used)

Does it pass the test of site password checkers? Yes – all passwords have upper and lower case letters, numbers, and special characters. All passwords are longer than 8 characters.

Can I remember it? Yes – all passwords begin with the same prefix and end in a combination of letters I can derive from the website domain. Exceptions are derivative sites, YouTube and Outlook which use the same password as their parent company site. Yelp optionally can use Google login, or you may prefer to create it’s own unique login to stick with your scheme.

Google.commyemailaddress @anywhere.com960228()GGLcmanotheremailaddress
Live.com960228()LVcm Select “use Google to login” see Google see Google myemailaddress @anywhere.com960228()BNKcm my bank account number, DOB, and SSN Use Google login Google owns Youtube Use login Both are owned by
Roku.tvmyemailaddress @anywhere.com960228()RKtv My phone number; not .com: .tv !
Sci.fimyemailaddress @anywhere.com960228()SCfanotheremailaddress
Example Password System

Blockchain – the NEW currency explained

This article cannot be an exhaustive discussion, but we felt this highly technical subject needs to be addressed in toddler language for citizens over 60, who are still largely using traditional brick and mortar investing.

Toddlers love to play with ABC blocks, so visualize that you have a dozen sets of such blocks with a large (but not endless) closet supply of more sets any time you need them. Now suppose whenever your toddler comes up with a word combination of 5 blocks, you add $1 to his allowance. We could call this transaction one blockchain. But it isn’t quite that simple, because it is necessary to uniquely mark that set of blocks and to connect the set to the next set of blocks that occurred in time sequence after it. In other words, we are not dealing with only one toddler, we have a whole preschool and they are making words, selling them with each other, and cashing out to go home at various times of the day. Without transactional time linkage, it would be impossible to keep the finances straight. In blockchain purchases, computers do the transactions automatically and uniquely. The system is created in such a way that each time a new blockchain is created, there are fewer blockchains (fewer blocks to work with), which implies higher demand. Higher demand pushes the price of making a chain of blocks higher — Johnny then gets $5 for each word he makes!

Is this a pyramid scheme? Not at all. It is traditional capitalism. It is more akin to a high-risk investment portfolio. Anything bought or sold is a risk of some sort. If you spend $10 for 10 lbs of potatoes, you have a risk that some of the potatoes are not good, and perhaps you could have done better buying a different product. The risk is low, but it is there. Now you may find there is a shortage of potatoes, and thus suddenly that same bag of potatoes is $20. If you see the store shelves are empty, you might be able to re-sell your bag of potatoes for $30 to a customer who really wants potatoes. This is basic supply and demand economics. The greater the supply, the lower the price. The greater the demand, the more people will pay for the product. It is nothing different in cryptocurrency — as demand for a currency (think of it as something that can be bought and sold for profits, like potatoes or scalped football game tickets) — as demand rises, so does the potential profit from sale of the item.

Like any product, hype or marketing can make cryptocurrency increase value temporarily, but once the value has settled, it usually decreases only when people decide they want to get rid of the investment they have made. You spent $10 on potatoes – great, you have 10 lbs of potatoes and assuming they don’t all instantly rot, you’ll have $10 value tomorrow. However, if a booming potato crop that year hits the market, chances are you are not going to be able to sell your bag of potatoes to get your $10 back. BUT, you still have 10 lbs of potatoes. Did you lose anything? Not really. The financial world calls this unrealized gain or loss. It appears potatoes are worth less (not worthless, less worth) but you still have 10 pounds, so how is it worth less? It only has less worth if you attempt to sell. Free market economics changes the value of your “potatoes”.

The newness of cryptocurrencies makes them relatively high risk. At one point in United States history, the American dollar was high risk. Some might argue it is high risk today. Again, everything comes with risk. For some, the potential price increases in putting money into a new cryptocurrency is well worth the risk they face, for they guess, the currency will likely increase rather than decrease in value over time, much like land and other traditional investments do. The key reason for this phenomena is the fact that given any apple pie, one can cut it into 8 slices, and sell each slice for $1, but at some point, that 9th person wants a slice and then the value of a slice doubles to $2, and if a 10th person wants it too, now you can ask for $4 for that last slice, and so on: supply and demand economics. Blockchains are intangible assets that are wholly controlled by electronic programs which record each transaction, keep ledgers automatically, and limit the size of the pie so the value of the block never disappears completely. The worst thing that could happen, is that millions of people suddenly decide to sell their cryptocurrency at the market prices. With each sell, the price will drop slightly until the very last person who sells may get back less than originally invested and pay transaction fees. They will think they have been shorted, but have they? They bought $10 worth of potatoes, kept them for a year (supposing potatoes never rot), and then they went back to the store a year later and sold them for whatever price someone would give them. They neither won nor lost anything. Only, because of inflation, they find when they want 10 lb of potatoes they now have to spend $12 to buy them!

The main consideration that makes cryptocurrency different from a bag of potatoes (or stock, or land purchase) is the fact that cryptocurrency is entirely digital in nature. Even if the lights go off I can feel the potatoes and count them, but if the world’s computers were suddenly destroyed, cryptocurrency would essentially cease to exist — at least until electricity was restored — for all the records would be merely in electronic format and no one could know who owned what until the computers came back online. Would the records disappear? No, very unlikely, because the whole idea behind blockchain is duplication of records across hundreds of different networks so that not one, not two, and not even a multi-failure of networks brings the whole system down. It might work more slowly for awhile, but it will still continue with the same records. It would take a TOTAL failure of every connected network around the world for it to be catastrophic enough to make the currency inaccessible, and thus without value.

Caution should not be thrown to the wind with regard to purchase of cryptocurrency. While cryptocurrency investment can be a very legitimate form of investment, as with any investment, it carries substantial risk. Risk also means potential for increase on the positive side, or potential for loss on the negative side. The rate at which a particular cryptocurrency is fluctuating must be carefully considered. Unlike stocks, which can be traced back to physical assets and corporate production of products or services, cryptocurrency has no backing other than the transactional record of deposit itself. Thus a run on the cryptocurrency system — everyone trying to cash out at once — will definitely affect the price of the Nth person who cashes out. The last person out will be sorely disappointed, while the first person out will likely take a windfall profit. It is anyone’s take, however: As long as your cell phone works or you can get to a public computer, everyone has essentially equal access to cash-out at any random moment.

B.A. Computer Services is not a broker or investment advisor. Nothing herein constitutes investment advise or recommendations. We merely provide our best effort to break down technology lingo for the “average Jo[e]”.

Google Killing Off Businesses

It has come to our attention that Google has a policy of arbitrarily suspending business profiles for alleged policy violations WITHOUT any process in place to notify the business owner of the alleged violation prior to the suspension taking place. This effectively kills off the business contact to the world and may result in customer loss. Google fails to notify business owners of a defect prior to suspending their Google My Business profile. The business profile, including all reviews, photos, phone information, chat channel, and its map location are totally hidden from the Google map search results. Your clients will no longer be able to find you from the typical Android cell phone that is programmed to use Google maps by default.

Google fails to notify business owners of a defect prior to suspending their business profile. The Google My Business profile, including all reviews, photos, phone information, chat channel, and map location to the business are totally hidden from Google map search results.

B. A. Computer Services has had the experience of trying to work through the Google processes to restore these profiles and has found the Google system arbitrary, difficult, and slow enough to leave your business offline for weeks. It is of course the prerogative of any private enterprise to discontinue their services at any time with anyone they choose, provided contractual notice is given. Even if no notice is technically required, it is simply bad business conduct for any company to arbitrarily cancel or suspend clients WITHOUT ADVANCED NOTICE to give them opportunity to cure the objection prior to suspension.

It is B. A. Computer Services’ policy not to promote issues based on political agendas, but to report them based on real-life experience from a technical perspective. If you have been affected by these issues, B.¬†A.¬†Computer Services may be able to help walk you through the process to restore your business profile and promote your business through non-Google channels.


YOU GET AN Email from a legitimate looking person who reports an invoice paid for a subscription to McAfee.

You do not own or use McAfee software, or you have it and your subscription is already current.

WHAT IS HAPPENING! You ask yourself, I don’t remember paying that? Or, I used to have McAfee, I thought I cancelled that long time ago???


Here is how the scam works. The email alleges they made a payment for you. However, the sender of the mail does not work for McAfee at all. Certain details of the email tip off that the email is a phishing attempt.

“Phishing” is the deceptive art of attempting to get financial information out of you so they can then actually charge your card for a service you never requested.

Tips to Detect the Phishing Attempt

  • Look at FROM: line. Most legitimate businesses have a unique domain that corresponds to their business name. For example, email from B. A. Computer Services comes from When the FROM line comes from a generic or free account such as,,, or, and yet alleges to represent a well known company such as McAfee, that is highly suspicious.
  • Look at the TO: line. Is it blank? Is it to you? Then look at the BCC: line. Is it to you? If the sender of the email is using the BCC line to send you the email, the chances are he used the Blind Carbon Copy line to send it to hundreds of other innocent victims too. The email really isn’t about you at all. It is merely a generic phishing attempt. The list of addresses on the BCC line do not get revealed to the recipients of the email, thus it appears only you received the email when in fact possibly thousands of others did as well.
  • Look at the Email content. Does the email use your name in the text or the attachment? If it doesn’t, then probably the sender does not know your real name at all because you do not have an account with them.
  • Does the email use poor grammar or make spelling errors? A sure sign that it is (a rather poor) scam attempt.
  • Attachment? DO NOT DOWNLOAD IT if the any of the above items held true. The attachment is very likely a virus!

What To Do With The Unwanted Email

It is always safest simply to delete it outright. Don’t play with it. Delete it, Delete it, Delete it! If you are in doubt whether or not something really did get paid or needs to be paid, refer to the your bank or card company directly at the official phone numbers on your card or at your local bank. NEVER rely on the information in the email.

However, if you wish to be more proactive, some email platforms such as have options that allow you to report the phishing attempt. Gmail allows you to do this by clicking the 3 vertical dots menu and selecting “Report Phishing”. The effect of reporting it may alert the administrative team of your email provider that their platform is being used to scam people. Information Managers generally have a very keen eye for these scams and a proprietary interest in blocking the source of the email so you and no one else gets them from that source again.

Recommendation: Do not randomly report emails as phishing if they are not truly phishing because they will bog down the administrators who are trying to stop the real phishing attempts. The difference between a phishing scam and an unsolicited spam email is that the phishing scam alleges a financial transaction has already or needs to be confirmed in such a way that it fools you into calling the number in which the scammer can then pump you for information so they can actually scam you out of money. Until you make the call, you have averted the scam. The moment you make the call, you make yourself a direct target for this and future scams. The call you make identifies your phone number to the scammers and they will thereafter re-attempt to scam you again and again from other random phone numbers, most likely. So once again, DO NOT CALL THE NUMBER IN THE EMAIL.

Other Resources

Your first-line responders to the possibility that an email is a scam may be a family member, your neighbor, or a local tech person. Other resources include the official government channels. B. A. Computer Services cannot endorse any one website as a single source that will solve the world’s phishing problems. Instead, we recommend that you first contact your email or internet provider and let them know about the attempt. Secondly, we recommend you search in your browser for “Report Phishing Attempt” and follow any of the many links that will be listed and choose the most relevant result that fits your particular situation. You may also contact the FBI at or the Federal Trade Commission

Recycling Assistance Provided

Do you maintain your lawn? Do you clean your house? Trash is picked up at curb? But what about those old electronics?

B. A. Computer Services will assist you in recycling most electronic equipment free of charge with your paid service agreement2. You may bring your equipment to our service center or you may set the equipment in an accessible entry way for loading with paid repair of your current computer system. Limitations apply1.

1Recycling pickup is a courtesy service for paid customers. Limitations include the right to refuse any type or quantity of equipment. Items known to be non-recyclable are:

  • Televisions
  • Kitchen electronics, toasters, makers, appliances
  • Large commercial speakers
  • Kitchen or Laundry Appliances
  • Floor-model (self-standing) copiers or printers
  • Large servers
  • Ordinary Alkaline and non-rechargeable lithium batteries
  • Smoke detectors
  • Lamps or bulbsCommercial quantities (more than 10 per pickup)

2You may pay our minimum $35 service fee if you want equipment pickup without computer repair.

Good-bye Yahoo (And long gone Hotmail)

For some, Yahoo has a been a beloved site with everything from free email, to free advertising, and free chat, dating, stock quotes, just about everything under the sun. Sadly, Yahoo hasn’t had a very robust financial backing for some time.

Yahoo email is now owned by Verizon and Verizon has announced it will slowly but surely discontinue the Yahoo brand in favor of its own brand. While we have no definitive details about when or how Verizon intends to accomplish this, here at B. A. Computer Services we must warn and strongly suggest that users of Yahoo Mail find an alternative as soon as possible.

B. A. Computer Services warns and strongly suggests users of Yahoo Mail find alternatives as soon as possible.

As for Hotmail, it was officially discontinued decades ago, but is incorporated into Microsoft’s other email websites. An attempt to access will redirect you immediately to If you are still using an email ending in it may still work for the moment because Microsoft has forwarded the email internally through its primary email servers, but that is no guarantee at any given day they decide to turn that forwarding off. You should take action and move to another email address as soon as possible.

B. A. Computer Services offers services that can move your existing mail, folders, and data from Yahoo or Hotmail over to another email and data provider of your choice.

Additional References regarding Yahoo

USA TODAY (2017): Yahoo Is No More

Stay on 10 or Move to Windows 11?

Microsoft Corp. is pushing the new Windows 11. Owner/Buyer Beware. Microsoft has spent the past decade refining Windows 10 into a stable product. Unfortunately, it may be another 10 years before Windows 11 has the same credentials.

To-date we can see no reason to upgrade to Windows 11 if you have a perfectly good running copy of Windows 10 already installed. Windows 10 provides support for migration from previous operating system and drivers to support legacy 32-bit hardware. Variants of the older hardware have been sold and installed since Windows 10 was first revealed, for over a decade. It is very likely that your existing physical device–laptop or desktop–has some legacy 32-bit hardware components that are not compatible with Windows 11.

Even if your hardware manufacturer documentation insists your device is a 64-bit computer, Windows 10 may still report that it cannot be upgraded to Windows 11. It is a sure sign that some components are not as advanced as they say they are, or that memory requirements have not been met for Windows 11. The message, which Microsoft has begun displaying under Settings->Windows Updates, should be taken as a positive affirmation to stay safely on Windows 10 for as long as your hardware will run. Further, the Microsoft evaluation that your device is indeed eligible for Windows 11 may be extremely misleading. Certain new component drivers may not yet have been included with the weakened hardware device support Windows 11 now minimally includes.

Windows 11 will only run on newer 64 bit hardware. Not all hardware that says it is 64 bit is truly 64 bit throughout.

Windows 11 will only run on 64-bit hardware. Windows 10, in contrast, will run on 32-bit and 64-bit hardware, and retains a full suite of component device support. The beauty of Windows 10 is its ability to automatically detect hardware and reconfigure itself automatically. However, as quickly as I write this, it is likely Microsoft will re-engineer their Windows 10 updates in such a way as to begin removing legacy hardware support. In other words, a day may soon arrive that Windows 7 machines and Windows 10 machines on older 32-bit hardware cannot be upgraded to Windows 10 any longer. Support for Windows 10 will wane in the next few years, and consumers will be forced into purchasing newer computers.

Especially when it involves our pocketbook, most consumers loathe being told what to do or when to do it. B.A. Computer Services is here to help navigate through options with as little affiliation to any particular operating system as possible. Our philosophy promotes helping ensure technology suits the individual for whom it is designed. Simply stated, does it work, and, does it work well for you in your station of life?

LG will no longer manufacture mobile phones

LG announces it will no longer manufacture mobile phones according to Joe Pinkstone For 4/5/2021

LG devices won’t immediately disappear from store shelves; instead, the company plans to let current supplies dwindle without replacing any inventory. Existing LG phones will continue to receive support, with the exact length of that support to vary based on region according to Tom’s Guide 4/5/2021.

Here is the official LG announcement page.

Google Crashes Linux Amazon, Netflix, Spotify, Roku, others…

Google has quietly ended support for 32bit versions of Linux DRM Widevine support in Firefox browsers. Prior to May 31, 2021 individuals running a 32 bit version of Linux could watch Amazon Prime, Roku, and Netflix videos just fine through the Firefox web browser natively installed with most Linux distributions.

Videos stopped working on several laptops we had deployed and after diligent research we discovered the problem was not particular to Firefox, but was caused by the Widevine DRM plugin not functioning. There is no known workaround at this time. It is noted that one of our computers has 64bit processors running a 32bit version of Linux. It experiences the same problem as the 32bit processor machines.

A search on the Internet for solutions turns up nothing yet. Many sites instruct how to disable or enable the Widevine plugin, but they are useless. Even when properly installed the back-end support from Google simply is non-existent. The best alternative at this time is to use a newer 64bit device. Most 32 bit computers are slowly fading away.

Here is a similar article.

Don’t waste your time trying to fix DRM if you are on an older machine! See note on firefox at

TeraGibiMega Jumble

If you think Computer Geeks all speak in tongues, no not all of them. Here is a quick reference guide to help you with the storage size language:

Inside the computer the smallest piece of information is a bit but in real world, no one needs to talk about bits because even a single character is the next smallest unit up, a byte. Counting bits and bytes is like counting kernels of sand on the beach. Typically one would not count the letters in a document, but might count the words or pages. Similarly, typically one wound not measure how many letters a memory stick can hold, but would measure how many megabytes it holds.

Memory sticks, and drives are measured in megabytes (MB) or Gigabytes (GB). Mega- is thousands of, so instead of counting every grain on the beach, take a scoop of sand and call it a megabyte of sand. If one scoop isn’t enough for your castle, then get two scoops, or 64 scoops, or 128 scoops. M could represent Measuring-cup-full.

Disk drives are long term storage devices meant to last for years. Today drives come in Gigabyte capacities. Giga- is a thousand times bigger than a mega-. Instead of thinking measuring-cup full, think of a barrel of sand. You might want 100 barrels of sand to fill in a land depression–100 Gigabytes is enough to install Windows and have minimal space available for your documents, just as 100 barrels of sand may be enough to create a small backyard pool area.

If you have 1000 barrels of sand, you now have a tera- amount of sand. Perhaps you have seen a pile of sand or rocks near a road construction site. That might be a few tera-grains of sand. A terabyte drive is therefore quite a sum of bytes. Typical drive sizes today hold 500GB (= 1/2 Terabyte), 750 GB (=3/4 Terabyte), 1 TB, or 2TB. You can figure with a Tera-grain pile of fertilizer, it will spread out for years. So it is with a Terabyte drive. Usually a half Terabyte, the same as a 500GB drive, is sufficient for the life of the computer for most people.

Incidentally, the difference between a Mega- and Mibi- or a Giga- and a Gibi- is that all the -gas are 1000 times greater while all the -ibis are 1024 times greater. The number closest to 1000 in a power of 2 is 1024 and is often used because computers speak binary: 2x2x2x2x2x2x2x2x2x2 = 1024 = 2^10